In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2capconnect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2capconnect.constprop.0+0x10d8/0x1270 net/bluetooth/l2capcore.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54 CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci2 hcirxwork Call Trace: <TASK> _dumpstack lib/dumpstack.c:93 [inline] dumpstacklvl+0x116/0x1f0 lib/dumpstack.c:119 printaddressdescription mm/kasan/report.c:377 [inline] printreport+0xc3/0x620 mm/kasan/report.c:488 kasanreport+0xd9/0x110 mm/kasan/report.c:601 l2capconnect.constprop.0+0x10d8/0x1270 net/bluetooth/l2capcore.c:3949 l2capconnectreq net/bluetooth/l2capcore.c:4080 [inline] l2capbredrsigcmd net/bluetooth/l2capcore.c:4772 [inline] l2capsigchannel net/bluetooth/l2capcore.c:5543 [inline] l2caprecvframe+0xf0b/0x8eb0 net/bluetooth/l2capcore.c:6825 l2caprecvacldata+0x9b4/0xb70 net/bluetooth/l2capcore.c:7514 hciacldatapacket net/bluetooth/hcicore.c:3791 [inline] hcirxwork+0xaab/0x1610 net/bluetooth/hcicore.c:4028 processonework+0x9c5/0x1b40 kernel/workqueue.c:3231 processscheduledworks kernel/workqueue.c:3312 [inline] workerthread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 retfromfork+0x45/0x80 arch/x86/kernel/process.c:147 retfromforkasm+0x1a/0x30 arch/x86/entry/entry64.S:244 ... Freed by task 5245: kasansavestack+0x33/0x60 mm/kasan/common.c:47 kasansavetrack+0x14/0x30 mm/kasan/common.c:68 kasansavefreeinfo+0x3b/0x60 mm/kasan/generic.c:579 poisonslabobject+0xf7/0x160 mm/kasan/common.c:240 _kasanslabfree+0x32/0x50 mm/kasan/common.c:256 kasanslabfree include/linux/kasan.h:184 [inline] slabfreehook mm/slub.c:2256 [inline] slabfree mm/slub.c:4477 [inline] kfree+0x12a/0x3b0 mm/slub.c:4598 l2capconnfree net/bluetooth/l2capcore.c:1810 [inline] krefput include/linux/kref.h:65 [inline] l2capconnput net/bluetooth/l2capcore.c:1822 [inline] l2capconndel+0x59d/0x730 net/bluetooth/l2capcore.c:1802 l2capconnectcfm+0x9e6/0xf80 net/bluetooth/l2capcore.c:7241 hciconnectcfm include/net/bluetooth/hcicore.h:1960 [inline] hciconnfailed+0x1c3/0x370 net/bluetooth/hciconn.c:1265 hciabortconnsync+0x75a/0xb50 net/bluetooth/hcisync.c:5583 abortconnsync+0x197/0x360 net/bluetooth/hciconn.c:2917 hcicmdsyncwork+0x1a4/0x410 net/bluetooth/hcisync.c:328 processonework+0x9c5/0x1b40 kernel/workqueue.c:3231 processscheduledworks kernel/workqueue.c:3312 [inline] workerthread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 retfromfork+0x45/0x80 arch/x86/kernel/process.c:147 retfromforkasm+0x1a/0x30 arch/x86/entry/entry64.S:244
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-aws-5.15-headers-5.15.0-1080", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-aws-5.15-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws-dbgsym", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1086", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-azure-5.15-headers-5.15.0-1086", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-azure-5.15-tools-5.15.0-1086", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1086-azure-dbgsym", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-modules-involflt-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-image-unsigned-5.15.0-1019-azure-fde", "binary_version": "5.15.0-1019.24~20.04.1.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1019-azure-fde-dbgsym", "binary_version": "5.15.0-1019.24~20.04.1.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-gcp-5.15-headers-5.15.0-1081", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-gcp-5.15-tools-5.15.0-1081", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1081-gcp-dbgsym", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-136-generic-64k", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-136-generic-lpae", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-headers-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-headers-5.15.0-136-generic-64k", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-headers-5.15.0-136-generic-lpae", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-136", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-hwe-5.15-headers-5.15.0-136", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-hwe-5.15-tools-5.15.0-136", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-5.15.0-136-generic-dbgsym", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-5.15.0-136-generic-lpae", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-5.15.0-136-generic-lpae-dbgsym", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-136-generic-64k", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-136-generic-64k-dbgsym", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-136-generic-dbgsym", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-modules-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-modules-5.15.0-136-generic-64k", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-modules-5.15.0-136-generic-lpae", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-tools-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-tools-5.15.0-136-generic-64k", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-tools-5.15.0-136-generic-lpae", "binary_version": "5.15.0-136.147~20.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-ibm-5.15-headers-5.15.0-1074", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-ibm-5.15-source-5.15.0", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-ibm-5.15-tools-5.15.0-1074", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-ibm-dbgsym", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-intel-iotg-dbgsym", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1077", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-cloud-tools-common", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1077", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1077", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-common", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-host", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-headers-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-headers-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k-dbgsym", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-dbgsym", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-135", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-135", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-135", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-modules-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-modules-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-tools-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-tools-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146~20.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-oracle-dbgsym", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-oracle-5.15-headers-5.15.0-1077", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-oracle-5.15-tools-5.15.0-1077", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-image-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-image-5.15.0-1075-generic-dbgsym", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-riscv-5.15-headers-5.15.0-1075", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-riscv-5.15-tools-5.15.0-1075", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-1039-nvidia-tegra-rt", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1039-nvidia-tegra-rt", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra-dbgsym", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra-rt", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra-rt-dbgsym", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1039-nvidia-tegra-rt", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-nvidia-tegra-5.15-headers-5.15.0-1039", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-nvidia-tegra-5.15-tools-5.15.0-1039", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1039-nvidia-tegra-rt", "binary_version": "5.15.0-1039.39~20.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-buildinfo-5.15.0-135-generic-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-buildinfo-5.15.0-135-generic-lpae", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-cloud-tools-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-cloud-tools-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-doc", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135-generic-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135-generic-lpae", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-5.15.0-135-generic-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-5.15.0-135-generic-lpae", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-5.15.0-135-generic-lpae-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-generic-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-generic-64k-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-generic-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-libc-dev", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-5.15.0-135-generic-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-5.15.0-135-generic-lpae", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-extra-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-source-5.15.0", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135-generic-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135-generic-lpae", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-common", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-host", "binary_version": "5.15.0-135.146" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-aws-cloud-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-aws-headers-5.15.0-1080", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-aws-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-buildinfo-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-cloud-tools-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-headers-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws-dbgsym", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-modules-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-modules-extra-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-tools-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-aws-6.8-headers-6.8.0-1023", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-aws-6.8-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws-dbgsym", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-azure-cloud-tools-5.15.0-1084", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-azure-headers-5.15.0-1084", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-azure-tools-5.15.0-1084", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-buildinfo-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-cloud-tools-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-headers-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-image-unsigned-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-image-unsigned-5.15.0-1084-azure-dbgsym", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-modules-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-modules-extra-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-modules-involflt-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-tools-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-azure-6.8-headers-6.8.0-1025", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-azure-6.8-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure-dbgsym", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-involflt-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-gcp-headers-5.15.0-1079", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-gcp-tools-5.15.0-1079", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-headers-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-image-unsigned-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-image-unsigned-5.15.0-1079-gcp-dbgsym", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-modules-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-modules-extra-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-tools-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-gcp-6.8-headers-6.8.0-1024", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-gcp-6.8-tools-6.8.0-1024", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k-dbgsym", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-dbgsym", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-gke-headers-5.15.0-1077", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-gke-tools-5.15.0-1077", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-headers-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-gke-dbgsym", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-modules-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-modules-extra-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-tools-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-cloud-tools-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-gkeop-cloud-tools-5.15.0-1062", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-gkeop-headers-5.15.0-1062", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-gkeop-tools-5.15.0-1062", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-headers-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-image-unsigned-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-image-unsigned-5.15.0-1062-gkeop-dbgsym", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-modules-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-modules-extra-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-tools-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-headers-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-headers-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-57", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-hwe-6.8-headers-6.8.0-57", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-hwe-6.8-tools-6.8.0-57", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-6.8.0-57-generic-dbgsym", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic-64k-dbgsym", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic-dbgsym", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-ipu6-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-usbio-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-tools-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-tools-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-headers-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-ibm-cloud-tools-common", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-ibm-headers-5.15.0-1072", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-ibm-source-5.15.0", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-ibm-tools-5.15.0-1072", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-ibm-tools-common", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1072-ibm-dbgsym", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-modules-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-modules-extra-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-tools-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-cloud-tools-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-headers-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1073-intel-iot-realtime-dbgsym", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1073", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-cloud-tools-common", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-headers-5.15.0-1073", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-tools-5.15.0-1073", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-tools-common", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-tools-host", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-modules-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-modules-extra-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-tools-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-cloud-tools-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-headers-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-image-unsigned-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-image-unsigned-5.15.0-1075-intel-iotg-dbgsym", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1075", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-cloud-tools-common", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-headers-5.15.0-1075", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-tools-5.15.0-1075", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-tools-common", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-tools-host", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-modules-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-modules-extra-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-tools-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1076-kvm", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-headers-5.15.0-1076-kvm", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-image-unsigned-5.15.0-1076-kvm", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-image-unsigned-5.15.0-1076-kvm-dbgsym", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-kvm-headers-5.15.0-1076", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-kvm-tools-5.15.0-1076", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-modules-5.15.0-1076-kvm", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-tools-5.15.0-1076-kvm", "binary_version": "5.15.0-1076.81" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-buildinfo-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-cloud-tools-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-lowlatency-cloud-tools-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-lowlatency-headers-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-lowlatency-tools-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k-dbgsym", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-dbgsym", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-54", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-buildinfo-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-cloud-tools-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-cloud-tools-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-headers-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-headers-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia-dbgsym", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia-lowlatency-dbgsym", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-modules-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-modules-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-modules-extra-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-modules-nvidia-fs-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-modules-nvidia-fs-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-cloud-tools-5.15.0-1074", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-cloud-tools-common", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-headers-5.15.0-1074", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-tools-5.15.0-1074", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-tools-common", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-tools-host", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-tools-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-tools-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k-dbgsym", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-dbgsym", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-extra-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-nvidia-6.8-headers-6.8.0-1022", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-nvidia-6.8-tools-6.8.0-1022", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-buildinfo-5.15.0-1033-nvidia-tegra-rt", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-headers-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-headers-5.15.0-1033-nvidia-tegra-rt", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra-dbgsym", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra-rt", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra-rt-dbgsym", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-modules-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-modules-5.15.0-1033-nvidia-tegra-rt", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-modules-extra-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-nvidia-tegra-headers-5.15.0-1033", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-nvidia-tegra-tools-5.15.0-1033", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-tools-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-tools-5.15.0-1033-nvidia-tegra-rt", "binary_version": "5.15.0-1033.33" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-buildinfo-5.15.0-1021-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-headers-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-headers-5.15.0-1021-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx-dbgsym", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx-rt-dbgsym", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-modules-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-modules-5.15.0-1021-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-modules-extra-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-nvidia-tegra-igx-headers-5.15.0-1021", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-nvidia-tegra-igx-tools-5.15.0-1021", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-tools-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-tools-5.15.0-1021-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1021.21" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-headers-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-oracle-dbgsym", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-modules-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-modules-extra-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-oracle-headers-5.15.0-1077", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-oracle-tools-5.15.0-1077", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-tools-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k-dbgsym", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-dbgsym", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-oracle-6.8-headers-6.8.0-1020", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-oracle-6.8-tools-6.8.0-1020", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-headers-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-image-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-image-5.15.0-1074-raspi-dbgsym", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-modules-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-modules-extra-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-raspi-headers-5.15.0-1074", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-raspi-tools-5.15.0-1074", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-tools-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-image-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-image-6.8.0-53-generic-dbgsym", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-riscv-6.8-headers-6.8.0-53", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-riscv-6.8-tools-6.8.0-53", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1044-xilinx-zynqmp", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-headers-5.15.0-1044-xilinx-zynqmp", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-image-5.15.0-1044-xilinx-zynqmp", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-image-5.15.0-1044-xilinx-zynqmp-dbgsym", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-modules-5.15.0-1044-xilinx-zynqmp", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-tools-5.15.0-1044-xilinx-zynqmp", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1044", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1044", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-xilinx-zynqmp-tools-common", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-xilinx-zynqmp-tools-host", "binary_version": "5.15.0-1044.48" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "Available for NVIDIA BlueField platforms", "binaries": [ { "binary_name": "linux-bluefield-cloud-tools-common", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-bluefield-headers-5.15.0-1062", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-bluefield-tools-5.15.0-1062", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-bluefield-tools-host", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-buildinfo-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-headers-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-image-unsigned-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-image-unsigned-5.15.0-1062-bluefield-dbgsym", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-modules-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-modules-extra-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-tools-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "linux-aws-fips-cloud-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-aws-fips-headers-5.15.0-1080", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-aws-fips-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-buildinfo-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-cloud-tools-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-headers-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws-fips-dbgsym", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-modules-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-tools-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1083", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-azure-fips-headers-5.15.0-1083", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-azure-fips-tools-5.15.0-1083", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-buildinfo-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-cloud-tools-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-headers-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1083-azure-fips-dbgsym", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-modules-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-modules-involflt-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-tools-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-fips-headers-5.15.0-135", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-fips-tools-5.15.0-135", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-headers-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-fips-dbgsym", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-modules-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-tools-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-gcp-fips-headers-5.15.0-1079", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-gcp-fips-tools-5.15.0-1079", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-headers-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1079-gcp-fips-dbgsym", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-modules-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-tools-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-cloud-tools-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-headers-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-realtime-dbgsym", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-modules-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-modules-extra-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-cloud-tools-5.15.0-1080", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-cloud-tools-common", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-headers-5.15.0-1080", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-tools-5.15.0-1080", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-tools-common", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-tools-host", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-tools-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-bpf-dev", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-buildinfo-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-buildinfo-6.11.0-18-generic-64k", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-cloud-tools-6.11.0-18", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-cloud-tools-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-doc", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-headers-6.11.0-18", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-headers-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-headers-6.11.0-18-generic-64k", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-image-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-image-6.11.0-18-generic-dbgsym", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-image-unsigned-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-image-unsigned-6.11.0-18-generic-64k", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-image-unsigned-6.11.0-18-generic-64k-dbgsym", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-image-unsigned-6.11.0-18-generic-dbgsym", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-lib-rust-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-libc-dev", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-modules-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-modules-6.11.0-18-generic-64k", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-modules-extra-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-modules-ipu6-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-modules-ipu7-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-modules-usbio-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-modules-vision-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-source-6.11.0", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-tools-6.11.0-18", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-tools-6.11.0-18-generic", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-tools-6.11.0-18-generic-64k", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-tools-common", "binary_version": "6.11.0-18.18" }, { "binary_name": "linux-tools-host", "binary_version": "6.11.0-18.18" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-aws-cloud-tools-6.11.0-1009", "binary_version": "6.11.0-1009.10" }, { "binary_name": "linux-aws-headers-6.11.0-1009", "binary_version": "6.11.0-1009.10" }, { "binary_name": "linux-aws-tools-6.11.0-1009", "binary_version": "6.11.0-1009.10" }, { "binary_name": "linux-buildinfo-6.11.0-1009-aws", "binary_version": "6.11.0-1009.10" }, { "binary_name": "linux-cloud-tools-6.11.0-1009-aws", "binary_version": "6.11.0-1009.10" }, { "binary_name": "linux-headers-6.11.0-1009-aws", "binary_version": "6.11.0-1009.10" }, { "binary_name": "linux-image-unsigned-6.11.0-1009-aws", "binary_version": "6.11.0-1009.10" }, { "binary_name": "linux-image-unsigned-6.11.0-1009-aws-dbgsym", "binary_version": "6.11.0-1009.10" }, { "binary_name": "linux-modules-6.11.0-1009-aws", "binary_version": "6.11.0-1009.10" }, { "binary_name": "linux-modules-extra-6.11.0-1009-aws", "binary_version": "6.11.0-1009.10" }, { "binary_name": "linux-tools-6.11.0-1009-aws", "binary_version": "6.11.0-1009.10" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-azure-cloud-tools-6.11.0-1009", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-azure-headers-6.11.0-1009", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-azure-tools-6.11.0-1009", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-buildinfo-6.11.0-1009-azure", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-cloud-tools-6.11.0-1009-azure", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-headers-6.11.0-1009-azure", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-image-unsigned-6.11.0-1009-azure", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-image-unsigned-6.11.0-1009-azure-dbgsym", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-modules-6.11.0-1009-azure", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-modules-extra-6.11.0-1009-azure", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1009-azure", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-tools-6.11.0-1009-azure", "binary_version": "6.11.0-1009.9" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1009-gcp", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-gcp-headers-6.11.0-1009", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-gcp-tools-6.11.0-1009", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-headers-6.11.0-1009-gcp", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-image-unsigned-6.11.0-1009-gcp", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-image-unsigned-6.11.0-1009-gcp-dbgsym", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-modules-6.11.0-1009-gcp", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-modules-extra-6.11.0-1009-gcp", "binary_version": "6.11.0-1009.9" }, { "binary_name": "linux-tools-6.11.0-1009-gcp", "binary_version": "6.11.0-1009.9" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1010-lowlatency", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-buildinfo-6.11.0-1010-lowlatency-64k", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-cloud-tools-6.11.0-1010-lowlatency", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-headers-6.11.0-1010-lowlatency", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-headers-6.11.0-1010-lowlatency-64k", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-image-unsigned-6.11.0-1010-lowlatency", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-image-unsigned-6.11.0-1010-lowlatency-64k", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-image-unsigned-6.11.0-1010-lowlatency-64k-dbgsym", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-image-unsigned-6.11.0-1010-lowlatency-dbgsym", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-lowlatency-cloud-tools-6.11.0-1010", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-lowlatency-headers-6.11.0-1010", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-lowlatency-lib-rust-6.11.0-1010-lowlatency", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-lowlatency-tools-6.11.0-1010", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-modules-6.11.0-1010-lowlatency", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-modules-6.11.0-1010-lowlatency-64k", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1010-lowlatency", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-tools-6.11.0-1010-lowlatency", "binary_version": "6.11.0-1010.11" }, { "binary_name": "linux-tools-6.11.0-1010-lowlatency-64k", "binary_version": "6.11.0-1010.11" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1011-oracle", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-buildinfo-6.11.0-1011-oracle-64k", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-headers-6.11.0-1011-oracle", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-headers-6.11.0-1011-oracle-64k", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-oracle", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-oracle-64k", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-oracle-64k-dbgsym", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-oracle-dbgsym", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-modules-6.11.0-1011-oracle", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-modules-6.11.0-1011-oracle-64k", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-modules-extra-6.11.0-1011-oracle", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-modules-extra-6.11.0-1011-oracle-64k", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-oracle-headers-6.11.0-1011", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-oracle-tools-6.11.0-1011", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-tools-6.11.0-1011-oracle", "binary_version": "6.11.0-1011.12" }, { "binary_name": "linux-tools-6.11.0-1011-oracle-64k", "binary_version": "6.11.0-1011.12" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1008-raspi", "binary_version": "6.11.0-1008.8" }, { "binary_name": "linux-headers-6.11.0-1008-raspi", "binary_version": "6.11.0-1008.8" }, { "binary_name": "linux-image-6.11.0-1008-raspi", "binary_version": "6.11.0-1008.8" }, { "binary_name": "linux-image-6.11.0-1008-raspi-dbgsym", "binary_version": "6.11.0-1008.8" }, { "binary_name": "linux-modules-6.11.0-1008-raspi", "binary_version": "6.11.0-1008.8" }, { "binary_name": "linux-raspi-headers-6.11.0-1008", "binary_version": "6.11.0-1008.8" }, { "binary_name": "linux-raspi-tools-6.11.0-1008", "binary_version": "6.11.0-1008.8" }, { "binary_name": "linux-tools-6.11.0-1008-raspi", "binary_version": "6.11.0-1008.8" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1005-realtime", "binary_version": "6.11.0-1005.5" }, { "binary_name": "linux-cloud-tools-6.11.0-1005-realtime", "binary_version": "6.11.0-1005.5" }, { "binary_name": "linux-headers-6.11.0-1005-realtime", "binary_version": "6.11.0-1005.5" }, { "binary_name": "linux-image-unsigned-6.11.0-1005-realtime", "binary_version": "6.11.0-1005.5" }, { "binary_name": "linux-image-unsigned-6.11.0-1005-realtime-dbgsym", "binary_version": "6.11.0-1005.5" }, { "binary_name": "linux-modules-6.11.0-1005-realtime", "binary_version": "6.11.0-1005.5" }, { "binary_name": "linux-modules-extra-6.11.0-1005-realtime", "binary_version": "6.11.0-1005.5" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1005-realtime", "binary_version": "6.11.0-1005.5" }, { "binary_name": "linux-realtime-cloud-tools-6.11.0-1005", "binary_version": "6.11.0-1005.5" }, { "binary_name": "linux-realtime-headers-6.11.0-1005", "binary_version": "6.11.0-1005.5" }, { "binary_name": "linux-realtime-tools-6.11.0-1005", "binary_version": "6.11.0-1005.5" }, { "binary_name": "linux-tools-6.11.0-1005-realtime", "binary_version": "6.11.0-1005.5" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-17-generic", "binary_version": "6.11.0-17.17.1" }, { "binary_name": "linux-headers-6.11.0-17-generic", "binary_version": "6.11.0-17.17.1" }, { "binary_name": "linux-image-6.11.0-17-generic", "binary_version": "6.11.0-17.17.1" }, { "binary_name": "linux-image-6.11.0-17-generic-dbgsym", "binary_version": "6.11.0-17.17.1" }, { "binary_name": "linux-modules-6.11.0-17-generic", "binary_version": "6.11.0-17.17.1" }, { "binary_name": "linux-riscv-headers-6.11.0-17", "binary_version": "6.11.0-17.17.1" }, { "binary_name": "linux-riscv-tools-6.11.0-17", "binary_version": "6.11.0-17.17.1" }, { "binary_name": "linux-tools-6.11.0-17-generic", "binary_version": "6.11.0-17.17.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-bpf-dev", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-buildinfo-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-buildinfo-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-cloud-tools-6.8.0-54", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-cloud-tools-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-doc", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-headers-6.8.0-54", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-headers-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-headers-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-6.8.0-54-generic-dbgsym", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic-64k-dbgsym", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic-dbgsym", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-lib-rust-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-libc-dev", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-extra-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-ipu6-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-usbio-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-source-6.8.0", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-6.8.0-54", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-common", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-host", "binary_version": "6.8.0-54.56" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-aws-cloud-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-aws-headers-6.8.0-1023", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-aws-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-buildinfo-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-cloud-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-headers-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws-dbgsym", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-modules-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-modules-extra-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-azure-cloud-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-azure-headers-6.8.0-1025", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-azure-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-buildinfo-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-cloud-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-headers-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure-dbgsym", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-extra-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-involflt-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-azure-6.11-cloud-tools-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-azure-6.11-headers-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-azure-6.11-tools-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-cloud-tools-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1012-azure-dbgsym", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-azure-nvidia-cloud-tools-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-cloud-tools-common", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-headers-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-tools-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-buildinfo-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-cloud-tools-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-headers-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-image-unsigned-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-image-unsigned-6.8.0-1014-azure-nvidia-dbgsym", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-modules-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-modules-extra-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-tools-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-buildinfo-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-gcp-headers-6.8.0-1024", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-gcp-tools-6.8.0-1024", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-headers-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-headers-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k-dbgsym", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-dbgsym", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-tools-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-tools-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-headers-6.11.0-1011", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-lib-rust-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-tools-6.11.0-1011", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-64k-dbgsym", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-dbgsym", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-gke-headers-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-gke-tools-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-headers-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-unsigned-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-unsigned-6.8.0-1019-gke-dbgsym", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-extra-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-tools-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-cloud-tools-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-gkeop-cloud-tools-6.8.0-1006", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-gkeop-headers-6.8.0-1006", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-gkeop-tools-6.8.0-1006", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-headers-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-image-unsigned-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-image-unsigned-6.8.0-1006-gkeop-dbgsym", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-modules-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-modules-extra-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-tools-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-19-generic-64k", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-cloud-tools-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-headers-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-headers-6.11.0-19-generic-64k", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-hwe-6.11-cloud-tools-6.11.0-19", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-hwe-6.11-headers-6.11.0-19", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-hwe-6.11-lib-rust-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-hwe-6.11-tools-6.11.0-19", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-6.11.0-19-generic-dbgsym", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-19-generic-64k", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-19-generic-64k-dbgsym", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-19-generic-dbgsym", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-6.11.0-19-generic-64k", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-ipu6-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-ipu7-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-usbio-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-vision-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-tools-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-tools-6.11.0-19-generic-64k", "binary_version": "6.11.0-19.19~24.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-headers-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-ibm-headers-6.8.0-1022", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-ibm-tools-6.8.0-1022", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-ibm-dbgsym", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-modules-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-modules-extra-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-tools-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-cloud-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k-dbgsym", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-dbgsym", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-cloud-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-headers-6.8.0-54", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-lib-rust-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1011-lowlatency-64k", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-cloud-tools-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-lowlatency-64k", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-lowlatency-64k", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-lowlatency-64k-dbgsym", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-lowlatency-dbgsym", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1011", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.11-headers-6.11.0-1011", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.11-tools-6.11.0-1011", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-lowlatency-64k", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-lowlatency-64k", "binary_version": "6.11.0-1011.12~24.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k-dbgsym", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-dbgsym", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-extra-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-nvidia-headers-6.8.0-1022", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-nvidia-tools-6.8.0-1022", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-64k-dbgsym", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-dbgsym", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-extra-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1022", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1022", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-buildinfo-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-headers-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-headers-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-nvidia-tegra-dbgsym", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-nvidia-tegra-rt-dbgsym", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-extra-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-extra-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-nvidia-tegra-headers-6.8.0-1003", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-nvidia-tegra-tools-6.8.0-1003", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-tools-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-tools-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-headers-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-oem-dbgsym", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-ipu6-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-ipu7-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-usbio-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-vision-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-oem-6.11-headers-6.11.0-1015", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-oem-6.11-tools-6.11.0-1015", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-tools-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-headers-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-image-unsigned-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-image-unsigned-6.14.0-1005-oem-dbgsym", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-ipu6-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-ipu7-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-iwlwifi-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-usbio-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-vision-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-oem-6.14-headers-6.14.0-1005", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-oem-6.14-tools-6.14.0-1005", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-tools-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-headers-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oem-dbgsym", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-ipu6-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-usbio-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-oem-6.8-headers-6.8.0-1024", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-oem-6.8-tools-6.8.0-1024", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-tools-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-buildinfo-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-headers-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-headers-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k-dbgsym", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-dbgsym", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-oracle-headers-6.8.0-1020", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-oracle-tools-6.8.0-1020", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-tools-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-tools-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-headers-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-6.8.0-1019-raspi-dbgsym", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-raspi-headers-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-raspi-tools-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-tools-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-headers-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-image-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-image-6.8.0-53-generic-dbgsym", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-modules-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-riscv-headers-6.8.0-53", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-riscv-tools-6.8.0-53", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-tools-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.14.0-22-generic", "binary_version": "6.14.0-22.22.1~24.04.1" }, { "binary_name": "linux-headers-6.14.0-22-generic", "binary_version": "6.14.0-22.22.1~24.04.1" }, { "binary_name": "linux-image-6.14.0-22-generic", "binary_version": "6.14.0-22.22.1~24.04.1" }, { "binary_name": "linux-image-6.14.0-22-generic-dbgsym", "binary_version": "6.14.0-22.22.1~24.04.1" }, { "binary_name": "linux-modules-6.14.0-22-generic", "binary_version": "6.14.0-22.22.1~24.04.1" }, { "binary_name": "linux-riscv-6.14-headers-6.14.0-22", "binary_version": "6.14.0-22.22.1~24.04.1" }, { "binary_name": "linux-riscv-6.14-tools-6.14.0-22", "binary_version": "6.14.0-22.22.1~24.04.1" }, { "binary_name": "linux-tools-6.14.0-22-generic", "binary_version": "6.14.0-22.22.1~24.04.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-headers-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-image-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-image-6.8.0-2018-raspi-realtime-dbgsym", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-modules-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-raspi-realtime-headers-6.8.0-2018", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-raspi-realtime-tools-6.8.0-2018", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-tools-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "linux-buildinfo-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-cloud-tools-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-headers-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-image-unsigned-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-image-unsigned-6.8.1-1016-realtime-dbgsym", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-modules-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-modules-extra-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-modules-iwlwifi-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-realtime-cloud-tools-6.8.1-1016", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-realtime-headers-6.8.1-1016", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-realtime-tools-6.8.1-1016", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-tools-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-bpf-dev", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-buildinfo-6.12.0-12-generic", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-buildinfo-6.12.0-12-generic-64k", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-cloud-tools-6.12.0-12", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-cloud-tools-6.12.0-12-generic", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-doc", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-headers-6.12.0-12", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-headers-6.12.0-12-generic", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-headers-6.12.0-12-generic-64k", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-image-6.12.0-12-generic", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-image-6.12.0-12-generic-dbgsym", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-image-unsigned-6.12.0-12-generic", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-image-unsigned-6.12.0-12-generic-64k", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-image-unsigned-6.12.0-12-generic-64k-dbgsym", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-image-unsigned-6.12.0-12-generic-dbgsym", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-lib-rust-6.12.0-12-generic", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-libc-dev", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-modules-6.12.0-12-generic", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-modules-6.12.0-12-generic-64k", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-modules-extra-6.12.0-12-generic", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-source-6.12.0", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-tools-6.12.0-12", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-tools-6.12.0-12-generic", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-tools-6.12.0-12-generic-64k", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-tools-common", "binary_version": "6.12.0-12.12" }, { "binary_name": "linux-tools-host", "binary_version": "6.12.0-12.12" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-aws-cloud-tools-6.12.0-1002", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-aws-headers-6.12.0-1002", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-aws-tools-6.12.0-1002", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-buildinfo-6.12.0-1002-aws", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-cloud-tools-6.12.0-1002-aws", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-headers-6.12.0-1002-aws", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-image-unsigned-6.12.0-1002-aws", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-image-unsigned-6.12.0-1002-aws-dbgsym", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-modules-6.12.0-1002-aws", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-modules-extra-6.12.0-1002-aws", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-tools-6.12.0-1002-aws", "binary_version": "6.12.0-1002.2" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-azure-cloud-tools-6.12.0-1002", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-azure-headers-6.12.0-1002", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-azure-tools-6.12.0-1002", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-buildinfo-6.12.0-1002-azure", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-cloud-tools-6.12.0-1002-azure", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-headers-6.12.0-1002-azure", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-image-unsigned-6.12.0-1002-azure", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-image-unsigned-6.12.0-1002-azure-dbgsym", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-modules-6.12.0-1002-azure", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-modules-extra-6.12.0-1002-azure", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-modules-iwlwifi-6.12.0-1002-azure", "binary_version": "6.12.0-1002.2" }, { "binary_name": "linux-tools-6.12.0-1002-azure", "binary_version": "6.12.0-1002.2" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.12.0-1001-gcp", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-gcp-headers-6.12.0-1001", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-gcp-tools-6.12.0-1001", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-headers-6.12.0-1001-gcp", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.12.0-1001-gcp", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.12.0-1001-gcp-dbgsym", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-modules-6.12.0-1001-gcp", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-modules-extra-6.12.0-1001-gcp", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-tools-6.12.0-1001-gcp", "binary_version": "6.12.0-1001.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.12.0-1001-oracle", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-buildinfo-6.12.0-1001-oracle-64k", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-headers-6.12.0-1001-oracle", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-headers-6.12.0-1001-oracle-64k", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.12.0-1001-oracle", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.12.0-1001-oracle-64k", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.12.0-1001-oracle-64k-dbgsym", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.12.0-1001-oracle-dbgsym", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-modules-6.12.0-1001-oracle", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-modules-6.12.0-1001-oracle-64k", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-modules-extra-6.12.0-1001-oracle", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-modules-extra-6.12.0-1001-oracle-64k", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-oracle-headers-6.12.0-1001", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-oracle-tools-6.12.0-1001", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-tools-6.12.0-1001-oracle", "binary_version": "6.12.0-1001.1" }, { "binary_name": "linux-tools-6.12.0-1001-oracle-64k", "binary_version": "6.12.0-1001.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.14.0-1003-raspi", "binary_version": "6.14.0-1003.3" }, { "binary_name": "linux-headers-6.14.0-1003-raspi", "binary_version": "6.14.0-1003.3" }, { "binary_name": "linux-image-6.14.0-1003-raspi", "binary_version": "6.14.0-1003.3" }, { "binary_name": "linux-image-6.14.0-1003-raspi-dbgsym", "binary_version": "6.14.0-1003.3" }, { "binary_name": "linux-modules-6.14.0-1003-raspi", "binary_version": "6.14.0-1003.3" }, { "binary_name": "linux-raspi-headers-6.14.0-1003", "binary_version": "6.14.0-1003.3" }, { "binary_name": "linux-raspi-tools-6.14.0-1003", "binary_version": "6.14.0-1003.3" }, { "binary_name": "linux-tools-6.14.0-1003-raspi", "binary_version": "6.14.0-1003.3" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.14.0-1001-realtime", "binary_version": "6.14.0-1001.1" }, { "binary_name": "linux-cloud-tools-6.14.0-1001-realtime", "binary_version": "6.14.0-1001.1" }, { "binary_name": "linux-headers-6.14.0-1001-realtime", "binary_version": "6.14.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.14.0-1001-realtime", "binary_version": "6.14.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.14.0-1001-realtime-dbgsym", "binary_version": "6.14.0-1001.1" }, { "binary_name": "linux-modules-6.14.0-1001-realtime", "binary_version": "6.14.0-1001.1" }, { "binary_name": "linux-modules-extra-6.14.0-1001-realtime", "binary_version": "6.14.0-1001.1" }, { "binary_name": "linux-modules-iwlwifi-6.14.0-1001-realtime", "binary_version": "6.14.0-1001.1" }, { "binary_name": "linux-realtime-cloud-tools-6.14.0-1001", "binary_version": "6.14.0-1001.1" }, { "binary_name": "linux-realtime-headers-6.14.0-1001", "binary_version": "6.14.0-1001.1" }, { "binary_name": "linux-realtime-tools-6.14.0-1001", "binary_version": "6.14.0-1001.1" }, { "binary_name": "linux-tools-6.14.0-1001-realtime", "binary_version": "6.14.0-1001.1" } ] }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-6.14.0-7-generic", "binary_version": "6.14.0-7.7.1" }, { "binary_name": "linux-headers-6.14.0-7-generic", "binary_version": "6.14.0-7.7.1" }, { "binary_name": "linux-image-6.14.0-7-generic", "binary_version": "6.14.0-7.7.1" }, { "binary_name": "linux-image-6.14.0-7-generic-dbgsym", "binary_version": "6.14.0-7.7.1" }, { "binary_name": "linux-modules-6.14.0-7-generic", "binary_version": "6.14.0-7.7.1" }, { "binary_name": "linux-riscv-headers-6.14.0-7", "binary_version": "6.14.0-7.7.1" }, { "binary_name": "linux-riscv-tools-6.14.0-7", "binary_version": "6.14.0-7.7.1" }, { "binary_name": "linux-tools-6.14.0-7-generic", "binary_version": "6.14.0-7.7.1" } ] }